Achive.php Cyber update - The Cyber Shark

SIM Swap Scams: A Growing Danger to Your Online Security

SIM Swap Scams

SIM Swap Scams are rising threats that enable cybercriminals to hijack phone numbers and access sensitive accounts. Protecting yourself with app-based 2FA, mobile account PINs, and cautious information sharing is crucial to staying secure. In today’s increasingly digital world, smartphones are more than communication tools; they are gateways to our personal data, finances, and online identities. Unfortunately, this makes them prime targets for cybercriminals. One of the most alarming types of fraud on the rise is SIM Swap Scams, also known as SIM hijacking. This scam can lead to severe consequences including financial loss, identity theft, and complete account takeovers. What is SIM Swap Fraud? SIM Swap Scams occur when a scammer successfully transfers your mobile number from your legitimate SIM card to the one they control. Once they gain control of your number, they can intercept calls and text messages, especially one-time passcodes (OTPs) used for two-factor authentication (2FA). This gives them unauthorised access to sensitive accounts, such as your bank, email, and social media. In 2021 alone, SIM Swap Scams accounted for an estimated $68 million in losses. In 2022, more than 1,600 complaints were reported in the U.S., indicating a global surge in such attacks as digital reliance increases. How SIM Swap Scams Work To execute a SIM swap, fraudsters gather personal information about their target through various means: Social Engineering: Scammers impersonate mobile carrier representatives and trick victims into revealing sensitive information. Phishing: Fraudsters send fake messages or emails appearing to be from legitimate organizations to extract personal details. Data Breaches: Hackers exploit leaked data from company breaches, using stolen names, addresses, and phone numbers to impersonate victims. Once they have the necessary details, scammers contact the victim’s mobile carrier pretending to be the victim. They claim they lost their phone and request a SIM replacement. Upon successful execution, the phone number is ported to the scammer’s SIM card, giving them full access to incoming calls and SMS-based OTPs. Risks of SIM Swap Fraud The implications of SIM swapping are far-reaching: Bank Account Takeovers: Scammers can intercept OTPs used for bank logins and drain your account. Social Media Hijacking: Fraudsters may take over social accounts to extort money or spread malicious content. Identity Theft: With access to your data, scammers can impersonate you, open new accounts, or conduct fraudulent activities in your name. Between 2018 and 2020, SIM Swap Scams caused a reported $12 million in losses, as per FBI data. With widespread reliance on SMS-based 2FA, the threat has never been more severe. How to Protect Yourself from SIM Swap Fraud Use Stronger 2FA Methods Avoid SMS-based 2FA when possible. Instead, opt for app-based authenticators like Google Authenticator or Authy, which are not tied to your phone number. Set a PIN or Password with Your Carrier Many mobile providers offer the option to add an extra layer of security in the form of a PIN or password. This makes it more difficult for scammers to impersonate you. Monitor Your Accounts Stay vigilant and regularly check your bank, email, and social media accounts for suspicious activities. Report any unusual behaviour to your service provider immediately. Be Cautious with Personal Information Limit what you share on social media, especially personal identifiers like your full name, date of birth, and address, which can be used by scammers to validate a SIM swap. Act Fast If You Suspect Fraud If you suddenly lose cell service or suspect your number has been compromised, contact your mobile provider immediately to lock your account and prevent further damage. Is eSIM Technology the Answer? An emerging technology that could reduce the risk of SIM swap fraud is the eSIM. Embedded directly into devices, eSIMs do not require physical cards, making it more challenging for fraudsters to swap or replace them. Benefits of eSIMs include: Enhanced Security: Harder to manipulate than physical SIMs. Convenience: Easily switch carriers without changing SIM cards. Space Efficiency: More compact design for slimmer devices. Although not yet universally adopted, eSIMs represent a promising step toward more secure mobile connectivity. SIM Swapping vs. Porting Attacks SIM swapping and porting attacks are often confused but operate differently: SIM Swapping: Involves fraudulently transferring a number to a new SIM card. Porting Attack: Transfers the number to a new carrier without switching the physical SIM. Both techniques allow scammers to hijack your accounts by intercepting 2FA codes. How SIM Swaps Lead to Account Takeovers Once in control of your number, scammers can: Reset passwords for key accounts using intercepted OTPs. Gain access to emails, social media, and banking apps. Use compromised access to commit further identity theft and fraud. This chain of events can devastate victims financially and emotionally, making prevention crucial. How Businesses Can Protect Customers Organizations, especially in tech and finance, must take steps to prevent account takeovers: Implement risk-detection systems like Prove’s Trust Score+ that evaluate SIM swap likelihood based on telecom data and user behaviour. Encourage users to enable app-based 2FA. Alert users of any suspicious account activity. By integrating proactive security tools, businesses can minimize the threat of SIM swap fraud and better protect their users. Conclusion SIM swap scams are a growing threat in the digital age, but awareness and proactive measures can significantly reduce your risk. Using app-based 2FA, securing your mobile account with a PIN, and limiting exposure to personal information are vital steps toward protecting your digital identity. As eSIM technology becomes more prevalent, it may further strengthen our defences against these attacks. Stay informed, stay cautious, and take control of your mobile security to avoid falling victim to this dangerous scam.

Karnataka orders formation of cyber command unit within state police to tackle rising cybercrimes

cyber command unit

The Karnataka government has established a Cyber Command unit within the state police to address the surge in cybercrimes, with 52,000 cases reported last year. The unit will operate under the Home Department and be led by the DGP for Cybercrime and Narcotics, using existing posts to minimize costs. On April 9, 2025, the Karnataka government issued an edict establishing a Cyber Command section within the state police to solely address the increasing number of cybercrime charges. According to the government directive, the Cyber Command unit will report directly to the state home department rather than the state police chief. It will be supervised by the Director General of Police for Cybercrime and Narcotics inside the Criminal Investigation Department. Traditional crimes like robbery, dacoity, and other types of physical theft have now been surpassed by cybercrimes. According to government sources, Karnataka recorded 52,000 cybercrimes last year, the most of any South Indian state. 43 CEN (cyber, economics, and narcotics) police stations, cyber-crime police stations operating under DGP, and CID under the Cyber Crimes Prevention Unit will be renamed by the government as part of the project. Up to 193 current police positions of all levels have been reorganized to operate under the cyber command. The Karnataka State Excise Act, 1965 (Karnataka Act, 21 of 1966), the Lotteries Act, 1964, the Karnataka State Lottery Rules, 1999, the Unlawful Activities Prevention Act, 1967 (Central Act, 37 of 1967), the Karnataka Control of Organized Crime Act, 2000 (Karnataka Act, 1 of 2002), and the Information Technology Act, 2000 all grant the CEN police stations the authority to file cases. Additionally, they are authorized to register offences under sections 420, 409, 467, 468, 471, 489 (A-E) of the Indian Penal Code (IPC) where the total amount involved exceeds Rs 50 lakh and to register money deposit frauds. To effectively prevent cybercrimes in Karnataka, the order states, “The Director General and Inspector General of Police have reviewed this proposal and considered it appropriate to establish a new Cyber Command Unit in the state without creating any new posts, using the existing posts, and without incurring much financial burden.” The Deputy Chief Secretary to the Government, Department of Home Affairs, will oversee the Cyber Command, which will be established by separating the positions of the DGP, Narcotics, and Cyber Crime in the CID Division. Pronab Mohanty, an IPS officer from the 1994 batch, is currently the DGP Narcotics and Cyber Crime. The government order states that the DG Cyber Command will oversee the Karnataka Cyber Security Policy and serve as the state’s Chief Information Security Officer. Additionally, a Multi Departmental Coordinating Committee (MDCC), established in March 2024 to handle disinformation cases, will report to the DG Cyber Command.

Open AI CEO Sam Altman claims Chat GPT can now reference and recall all your prior chats

Open AI

Open AI CEO Sam Altman announced that ChatGPT’s memory has been significantly improved, allowing it to recall and reference all prior conversations for more personalized responses. The feature is rolling out to Pro users first, with broader access coming soon, and users can manage or disable memory anytime. ChatGPT’s memory feature has been “greatly improved,” according to OpenAI CEO Sam Altman, who announced on 10 April 2025. This means that it can now recall and refer to all of your previous conversations with it. According to OpenAI, the feature will enable ChatGPT to provide more tailored responses based on your interests and preferences, making it even more useful for writing, learning, and other purposes.  “I think this is a fantastic feature, and it indicates something we are very excited about: AI systems that learn about you for your life and become incredibly helpful and customized,” Altman says. The feature’s rollout has already started. Only ChatGPT Pro members will be allowed to access it at first, and ChatGPT Plus customers will “soon” be able to do the same. In a few weeks, Team, Enterprise, and Edu customers will also have access, according to OpenAI. When or if the feature will be made available to free users is unknown. “EEA, UK, Switzerland, Norway, Iceland, and Liechtenstein” will not be able to use the service, Altman said. ChatGPT already has the memory feature. In September 2024, it was made available to ChatGPT Free, Plus, Team, and Enterprise users. The feature has now been enhanced, though. With the most recent update, OpenAI CEO Sam Altman claims that ChatGPT would be able to recall all of your previous chats with it when previously there were restrictions on how much context the chatbot could recall. This appears to be the beginning of your AI agent. It can now refer to your previous conversations in addition to the previously saved memories to provide answers that seem notably more pertinent and helpful. On X, OpenAI wrote, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.” Users will also have the option to choose not to use the functionality. Of course, you can choose not to participate in this or any recollection at all. In an article about X, OpenAI said, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.”You can go to Settings > Personalization > Memory to turn off the feature. You can switch memory there. Turning it on or off will prevent ChatGPT from remembering anything you discuss in the future. Additionally, you can choose “Manage Memory” to view the memory that is saved or to fully clear it. You have complete control over ChatGPT’s RAM as usual. You can change your settings at any time to stop using memory or previous conversations. By default, you will not be able to access previous conversations if you have already opted out of memory. Just ask in chat if you would want to modify the information that ChatGPT has on you. Use an ephemeral chat if you want to talk without consuming or affecting memory.

India to host Global Technology Summit in Delhi from April 10-12: Key agendas, theme and other details

Global Technology Summit

India is hosting the 9th Global Technology Summit in New Delhi from April 10–12, focusing on the theme “Sambhavna” (possibilities) to explore innovation and global tech cooperation. Co-hosted by MEA and Carnegie India, the summit will feature over 150 speakers from 40+ countries discussing key issues like AI governance, cybersecurity, and digital infrastructure. The 9th edition of the Global Technology Summit (GTS), which will bring together some of the world’s most brilliant minds, will take place in the nation’s capital from April 10 to April 12. External Affairs Minister Dr S. Jaishankar will make the opening comments and formally introduce the summit during its first session. Co-hosted by Carnegie India and the Ministry of External Affairs (MEA), the GTS is India’s leading forum for high-level discussion on geo technology. Headquartered in New Delhi and Established in 2016, Carnegie India is a member of a strong worldwide network that includes more than 170 researchers. According to a news release from the MEA, the summit intends to bring together leaders from academia, industry, government, and civil society to have crucial discussions on innovation, resilience, and international cooperation in the digital sector. This year’s Global Technology Summit’s topic This year’s Summit has “Sambhavna” as its subject; the Hindi term means possibilities. It will concentrate on how new technologies can be used to strengthen digital governance, encourage cross-border collaboration, and support inclusive growth. The Summit’s Agenda The Global Technology Summit is anticipated to have a jam-packed schedule with over 40 public sessions spread across three days. According to the MEA announcement, attendees can anticipate a diverse range of keynote talks, ministerial-level discussions, expert panels, and strategic dialogues that will address the most important technology concerns facing the globe. More than 150 eminent speakers from over 40 countries, including the US, UK, Japan, Australia, France, Germany, Netherlands, Brazil, UAE, Nigeria, the Philippines, and the European Union, are anticipated to attend the event. The MEA added that by contributing a range of perspectives to the conversation, these global thought leaders will highlight the opportunities and difficulties confronting the digital sector today. Data protection, cybersecurity, space security, artificial intelligence governance, digital public infrastructure, and expanding technological cooperation, especially in the Global South, are just a few of the important topics that will be covered. With its comprehensive and forward-looking agenda, GTS 2025 hopes to be a historic occasion that shapes the direction of international tech innovation and policy. “This year, GTS 2025 will also elevate the voices of the next generation. Students and young professionals from all over India will directly contribute to policy discussions on responsible AI, digital futures, and international tech standards through the GTS Young Ambassadors program,” the MEA continued. About Global Technology Summit The Global Technology Summit (GTS), India’s premier international conference for technology discussion, brings together policymakers, business leaders, academics, and innovators to shape the global dialogue on emerging technologies. The Ministry of External Affairs (MEA) and Carnegie India are co-hosting the summit, which offers a crucial platform for analysing how technology affects development, governance, security, and geopolitics. Held annually in New Delhi, GTS places a strong focus on innovation, resilience, and equitable growth. It brings together speakers from around the globe to discuss pressing issues like cybersecurity, digital infrastructure, AI governance, and cross-border tech collaboration.

Police in Tamil Nadu issued a warning about the possible dangers of creating Ghibli art online

Tamil Nadu

The Tamil Nadu Police Cyber Crime Wing has warned against using Ghibli AI Art generators, citing risks of data theft, identity fraud, and malware. Users uploading selfies to unofficial sites may unknowingly expose personal information to scams and cybercrimes. People have been alerted by the Tamil Nadu police to the possible dangers of creating “Ghibli AI Art” by sharing pictures or selfies. According to a statement from the State Police’s Cyber Crime Wing, the public’s use of Ghibli AI Art has alarmingly increased in recent days. The Ghibli AI Art generators created anime-like representations from user-uploaded images or selfies based on the user’s facial features. Users frequently overlook or undervalue the risks associated with this, though. The AI system would examine and record the surroundings, faces, and facial expressions. Without the user’s express consent, these uploads are utilized to train the AI. As stated in the announcement, “continuous uploading [of photos or selfies] will increase the system’s knowledge base.” Concerns were raised about the users’ inability to quickly remove the data they had submitted. There was no sure-fire method to ask for deletion in the case of image uploads. According to the police, users who distribute and use Ghibli’s artwork on internet platforms without permission, especially if they get it through dubious or unofficial means, run the possibility of falling victim to cybercrimes. Photographs uploaded on any dubious link could result in issues like data leaks or data being sold to unidentified advertising companies. A lot of websites that provided Ghibli artworks for free downloads were fronts for scams. Data loss and identity theft may result from users downloading content from these sources and unintentionally infecting their devices with malware, viruses, or ransomware. Popular Ghibli characters and artwork can be used by scammers as bait in phishing con games. Fake giveaways, competitions, or links to free Ghibli art downloads are frequently a part of these fraudulent efforts. If you click on these links, you could lose money or have your bank information and personal information stolen, the police said.

Hackers Deploy Neptune RAT via YouTube, Telegram & GitHub in Global Cyberattack

Neptune RAT

Hackers are spreading a powerful new malware, Neptune RAT, via YouTube, Telegram, and GitHub to steal passwords, and cryptocurrencies, and control Windows PCs undetected. Experts warn of its ransomware, spying, and data-wiping features, urging users to avoid suspicious links and strengthen cyber protection. The Neptune RAT, frequently referred to as the “Most Advanced RAT” (or remote access Trojan) ever, is a new strain of malware that hackers are using to infect vulnerable Windows PCs in a recent onslaught. The goal of this cyberattack is to hold victims hostage while stealing cryptocurrency and passwords. The Neptune RAT is quite sophisticated, according to a Cyber News report, and it can spy on the owner of the device, take over Windows devices, and do a lot more without being discovered by even the most effective antivirus program. The aforementioned malware strain is presently making the rounds on YouTube, Telegram, and GitHub, according to cybersecurity firm CYFIRMA. Similar to other malware strains, Neptune RAT operates on a malware-as-a-service basis, allowing any hacker to utilize it in their assaults for a monthly subscription. Everything you need to know about this new malware that targets Windows computers is provided here, along with some advice on how to protect your computer and data from the Neptune RAT. What can the Neptune RAT do? The Neptune RAT is a very powerful remote access program with a wide range of malevolent capabilities, according to CYFIRMA. A crypto clipper that tracks cryptocurrency transactions and substitutes wallet addresses under the control of attackers, rerouting cash without the victim’s awareness, is one of its most alarming characteristics. Apart from focusing on digital assets, Neptune RAT also has a password-stealing module that can retrieve login information from more than 270 programs, including popular web browsers like Chrome. The stolen data can be used to gain access to financial platforms, compromise social media accounts, and enable more attacks. The powers of the software go beyond simple stealing. One of its components is ransomware, which encrypts files and requests payment to unlock them. The system’s capacity to identify or react to the infection may be diminished if Windows Protector and other antivirus software are disabled. Additionally, Neptune RAT has screen tracking capabilities that let attackers see user activity in real-time. Data exploitation, blackmail, and spying are made possible by this. Neptune RAT contains a data destruction function that enables the attackers to fully erase the compromised system and leave no trace behind if they determine the virus has fulfilled its objective. How can one be safe? Since GitHub, Telegram, and YouTube are now the sites where Neptune RAT is being spread, users may want to avoid these sites as much as possible or exercise extreme caution while downloading files from them or clicking on links. Additionally, buying the best identity theft protection is encouraged as it will assist consumers in recovering money that has been lost due to an assault. These protection plans frequently include insurance, which is advantageous if an impacted user decides to replace their PC entirely.

Aadhaar Seva Kendra staff with access to data of thousands of visitors on cybercrime net

Aadhaar Seva Kendra

Two men from Haryana, including a former Aadhaar Seva Kendra staffer, were arrested by CID for forging Aadhaar and PAN cards to create fake firms and commit a ₹43 lakh Bitcoin scam. The accused misused the Aadhaar data of thousands of visitors, prompting a cybersecurity alert. CID investigators revealed that one of the two individuals detained from Haryana about a cyber scam purportedly led by bank management had previously worked at an Aadhaar Seva Kendra. The database of thousands of visitors to the centre was available to him. Officers from the state CID’s cyber police investigated a complaint from a resident of Chandernagore and discovered that several fake Aadhaar cards were used to register shell firms and related bank accounts. Himanshu Solanki, 32, and Praveen Kumar, 29, of Faridabad, Haryana, were detained by the state CID on 06 April 2025 suspicion of fabricating Aadhaar Seva Kendra and PAN cards as well as fictitious businesses using forged documents. Praveen Kumar altered his name to create several Aadhaar cards. He is identified as Paresh Kumar in one, Praveen Kumar in another, and Pratap Kumar in the third. Despite having different identities, they all share the same Aadhaar number, an officer stated. CID detectives believe that the gang, which has been falsifying the information of visitors to Aadhaar Seva Kendra, has other members. “It is best to mask your Aadhaar card so that the number will not be visible to anyone else, even if you use a photocopy,” a CID officer advised. To send an alert to the holder’s cell phone if someone attempts to commit any fraudulent conduct with their Aadhaar number, the police also suggested tying the Aadhaar to that number. According to CID officers, the accused defrauded the complainant of ₹43 lakh by enticing him to make a Bitcoin investment. On social media, he had seen the investment scheme’s marketing. A branch manager of a nationalized bank and his wife, who was stationed in Murshidabad, received the proceeds of the crime, the police discovered later in the investigation. The manager of the branch has already been taken into custody. He is being held by the police.

The Ghibli Art Craze: An Adorable Movement with a Secret Danger

Ghibli Art

The Ghibli Art trend has gone viral, turning real-life photos into whimsical animations, but cybercriminals are exploiting it with scams and malware. Authorities warn users to stay cautious and use only trusted platforms. The quirky new trend of Ghibli-style pictures has taken over the internet in recent weeks. From kids and influencers to famous people like Sachin Tendulkar and even official government websites, studio Ghibli’s distinctive animation style is being used to turn everyone’s real-life images into fantastical settings. However, there is a significant cybersecurity risk hidden beneath the idyllic images. The public was recently warned by the Chandigarh Police about the rise in cyber scams that use the Ghibli art craze as a lure. Why is Ghibli’s art so well-liked, and what is it? The renowned Japanese animation studio Studio Ghibli, founded by Hayao Miyazaki, Isao Takahata, and Toshio Suzuki, serves as the model for Ghibli Art. Studio Ghibli, well-known for classic movies like Spirited Away, My Neighbor Totoro, and Howl’s Moving Castle, is praised for its delicate colour schemes, emotionally charged narratives, and hand-drawn characters. Users may now quickly transform ordinary photographs into Ghibli-style illustrations thanks to the development of AI-powered tools. It’s now easier than ever to follow the trend, thanks to platforms like ChatGPT, which allow users to create up to three photos per day. How Did the Trend Go Viral? It all began when Seattle software engineer Grant Slaton created a Ghibli-style picture of his family at the beach using OpenAI’s image-generating tool. When he shared it on X (previously Twitter), it became viral, garnering millions of views and more than 45,000 likes. What started as a private post swiftly became a worldwide sensation, with others sharing their Ghibli-inspired works all across the world. The Dark Side: Cybercrime Hiding in Plain Sight The growing popularity of the fad presented an opportunity for cybercriminals. The Chandigarh Police said that criminals are now tricking people into installing malware or divulging personal information by exploiting phoney Ghibli art portals. Here’s how: Phishing Websites Phishers have created phoney Ghibli art websites that ask visitors to submit pictures. Once submitted, a photo or personal data may be stolen and used maliciously. Phishing emails Phishing emails purporting to be from Studio Ghibli are being sent to some users. These could provide links to “official” art outlets, products, or invitations to contests. However, after being clicked, these URLs have the potential to install malicious software that steals private information, including banking information and passwords. Scam Contests & Giveaways Cybercriminals are promising Ghibli-style artwork in exchange for user information through phoney online competitions and giveaways. It’s only a means of spreading viruses or gathering data. Dangerous Downloads Wallpapers or “Ghibli art packs” are available on some websites, however, the files could be infected with ransomware or viruses that lock down your computer or steal data. False Artist Listings Scammers are also using social media to pose as Ghibli fan artists. They might attempt to deceive users into disclosing personal information or offer phoney artwork.  How to Stay Safe: Tips from Cyber Experts Here are some crucial safety precautions if you’re following the Ghibli trend: When creating Ghibli artwork, only use reputable and authorized sites. Never click on strange links or dubious emails. Refrain from giving strangers access to your personal or financial information online. If a contest or deal looks “too good to be true,” it probably is. Therefore, make sure to check it out first. Inform cybercrime authorities about any dubious emails, profiles, or websites.  Final Thoughts Unquestionably stunning, the Ghibli Art movement is a celebration of creativity in the digital era. Yet, particularly on the internet, beauty frequently comes with risks. While incorporating a little fantasy into everyday life is fantastic, it’s equally crucial to remain vigilant and watchful. Go ahead and take in Ghibli’s magic, but be careful when you click. Art should be joyful, not dangerous.

Google Gemini Live update brings screen, and camera awareness to these phones

Google Gemini

Google rolls out Project Astra-based camera and screen-sharing features in Google Gemini Live, enhancing real-time interaction on Pixel 9 and Galaxy S25 devices. Older Pixel users can access the features with a Gemini Advanced subscription. Google has started rolling out Project Astra-based cameras and screen-sharing features in the Google Gemini Live interface as part of the most recent Pixel Drop. Devices from the Samsung Galaxy S25 and Google Pixel 9 series come with these features free of charge. The capabilities are also available to users of previous Pixel devices, although they will require a Google Gemini Advanced membership. More participatory and visually aware conversations are made possible by the new Google Gemini Live features, which let users share their device’s screen or camera feed in real-time with the AI assistant. Details of camera and screen sharing with Gemini Live To obtain immediate information, users can utilize the camera on their smartphone to display Google Gemini as a landmark, a store, or a dish. Gemini changes its replies in real time as the camera moves. Similar to this, users can receive assistance during screen sharing based on the content that is shown on their screen, including documents, photographs, and web pages. How to use Gemini Live to share a screen Screen sharing can be enabled in two ways: Using the Gemini App on Mobile: Go to the live interface after launching the Google Gemini app. Press the recently added “Turn on screen sharing” button located at the bottom. Select “Share screen” from the option that appears. Outside of the Gemini app: You can use a voice command or long-press the power button to activate Google Gemini . Press the floating “Share screen with Live” button that shows up above the Gemini overlay. Select “Share screen” from the option that appears. Go back to the Gemini mobile app and select “Turn off screen sharing” to end sharing. As an alternative, press “Stop sharing” on the Screen Sharing card after swiping down from the top edge of the screen. Additionally, if the screen is locked or Live is paused, screen sharing instantly ends. How to use Gemini Live to share a camera Users can show Gemini what they are seeing by using their camera app while screen sharing is enabled. As an alternative: To begin sharing a live feed in Gemini Live, tap the camera icon. To stop, tap it one more. As necessary, switch between the front and rear cameras. According to Google, the camera will switch off on its own in the following circumstances: Gemini Live will automatically restart when it is resumed after being paused. You will have to manually turn the camera back on if your screen locks.